Inthe paper, we introduce a real-time hand gesture recognition method using a neural network. The underlying system is an automatic music display system which consists of three modules;feature extraction module, patte...
详细信息
Inthe paper, we introduce a real-time hand gesture recognition method using a neural network. The underlying system is an automatic music display system which consists of three modules;feature extraction module, pattern classification module, and display control module. To reduce the computation time of the feature extraction process and the pattern classification process, a threedimensional data representation called motion history volume has been *** addition, we propose a feature selection technique based on a modified fuzzy min-max neural network. We have defined a relevance factor which can measure the relevance of a feature to classify the specific pattern classes. The feature selection method can remove ineffective features and erroneous features in the learning data set by using the relevance factor data.
Deep grammar Formalism such as Tree Adjoining Grammar(TAG) is widely used in Natural Language Generation(NLG). However, crafting the grammar not only requires expert knowledge of both the grammar formalism and the tar...
详细信息
ISBN:
(纸本)9781510803084
Deep grammar Formalism such as Tree Adjoining Grammar(TAG) is widely used in Natural Language Generation(NLG). However, crafting the grammar not only requires expert knowledge of both the grammar formalism and the target application domain of NLG, but also needs a lot of human labor. In this paper, we propose a semi-automatic approach to extract wellformed Lexicalized Tree Adjoining Grammar(LTAG) anchored with proper semantics from a parallel corpus. The parallel cor- pus consists of sentences and the correspondent semantics. This approach requires much less human effort. The result shows that our approach achieves comparable performance with the state-of-the-art. Meanwhile, the grammar extracted in this paper has better linguistic interpretation than previous work.
Nowadays,Wi Fi becomes a popular wireless accessory method to most of *** use Wi Fi to interact with the wireless Internet,perform commercial and financial transactions,or conducting recreational activities,*** it off...
详细信息
Nowadays,Wi Fi becomes a popular wireless accessory method to most of *** use Wi Fi to interact with the wireless Internet,perform commercial and financial transactions,or conducting recreational activities,*** it offers a more convenient life to people,the strong Electromagnetic waves(EMW) resulted from it endangers human health that has already turned out to be the primary study for medical *** alteration in the sleep EEG in rats due to chronic exposure to low-level non-thermal electromagnetic radiation was ***,EMW also attracts concern and panic of the inhabitants living in the surroundings which is filled with high-frequency and low-frequency *** paper proposed a design of EEG sensor to detect the logically reasoning brainwaves under electromagnetic wave *** study mainly focuses on how EMW produced from Wi Fi affects subject's brainwaves change under logically reasoning status when human beings expose in various intensity of EMW.
With the progress of IC manufacturing, the pattern size of IC has been shrunk. Once the pattern size on the mask is smaller than the wavelength of IC optical lithography, the chip variation(Optical proximity effect) m...
详细信息
With the progress of IC manufacturing, the pattern size of IC has been shrunk. Once the pattern size on the mask is smaller than the wavelength of IC optical lithography, the chip variation(Optical proximity effect) may arise, and result in bad yield. Optical Proximity Correction(OPC) is widely used by compensating the original mask to achieve expected exposure image. Our paper integrates two main techniques of OPC(Model-based, rule-based). Through combined hotspot analysis, we can get better image resolution. Moreover, a new parameter is proposed used as the criterion to partitions and merges mask sub-regions for parallel computing to achieve better computing performance. The experimental results show that the parallel computing can improve the runtime by average of 68%.
To understand the behavior of potential network invaders, this paper considers a system attack problem from the perspective of an invader. The invader intends to attack a system, where a group of sensors measure a pro...
详细信息
ISBN:
(纸本)9781467374439
To understand the behavior of potential network invaders, this paper considers a system attack problem from the perspective of an invader. The invader intends to attack a system, where a group of sensors measure a process state and send the measurements to a remote estimator for state estimation, by launching Denial-of-Service(Do S) attacks to block the communication channels. As the invader has a power budget and cannot block all the channels, he needs to decide which sensors to attack so that the estimation performance can be mostly affected, which is studied in this paper. In the scenario where the sensing abilities of the sensors have a full order, an explicit solution is provided. When the order does not exist, the problem is transformed into a convex optimization problem and is solved using efficient numerical algorithms.
With promising applications in e-health and entertainment, wireless body area networks (WBANs) have attracted the interest of both academia and industry. If WBANs are densely deployed within a small area, serious pr...
详细信息
With promising applications in e-health and entertainment, wireless body area networks (WBANs) have attracted the interest of both academia and industry. If WBANs are densely deployed within a small area, serious problems may arise between the WBANs. In this paper, we discuss issues related to the coexistence of WBANs and investigate the main factors that cause inter-WBAN interference. We survey inter- WBAN interference mitigation strategies and track recent research developments. We also discuss unresolved issues related to inter-WBAN interference mitigation and propose fu- ture research directions.
Imputation of missing attribute values in medical datasets for extracting hidden knowledge from medical datasets is an interesting research topic of interest which is very challenging. One cannot eliminate missing val...
详细信息
Imputation of missing attribute values in medical datasets for extracting hidden knowledge from medical datasets is an interesting research topic of interest which is very challenging. One cannot eliminate missing values in medical records. The reason may be because some tests may not been conducted as they are cost effective, values missed when conducting clinical trials, values may not have been recorded to name some of the reasons. Data mining researchers have been proposing various approaches to find and impute missing values. In this paper, we propose a novel imputation approach for fixing missing values. The approach is based on clustering concept and aims at dimensionality reduction of the records. This serves the need to use the same records of lower dimension to be used for clustering and classification of medical records to arrive at accurate decision prediction. The case study discussed shows that the missing values can be fixed and imputed efficiently by achieving dimensionality reduction. The proposed approach for imputation also achieved dimensionality reduction to perform efficient prediction of missing values.
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive informat...
详细信息
Because of the widespread of Trojans,organizations and Internet users become more vulnerable to the threat of information *** paper describes an information leakage detection system( ILDS) to detect sensitive information leakage caused by *** particular,the principles of the system are based on the analysis of net-flows in four perspectives: heartbeat behavior analysis,DNS abnormal analysis,uploaddownload ratio and content *** behavior analysis and DNS abnormal analysis are used to detect the existence of Trojans while upload-download ratio and content analysis can quickly detect when the information leakage *** indicate that the system is reliable and efficient in detecting information *** system can also help to collect and preserve digital evidence when information leakage incident occurs.
For the sake of brain-computer interfaces(BCIs) neurorehabilitation, an EEG feature, event-related(de)-synchronization(ERD/S) caused by motor imagery(MI) is widely used. However, its availability and reliability are l...
详细信息
For the sake of brain-computer interfaces(BCIs) neurorehabilitation, an EEG feature, event-related(de)-synchronization(ERD/S) caused by motor imagery(MI) is widely used. However, its availability and reliability are limited. Thus, a neurofeedback training is required for the use of the BCI system. To find an effective training condition of the MI-based BCI neurorehabilitation system for lower extremity, in this study, we investigated two types of MIs: foot dorsiflexion and leg extension. As the result, a clear trend toward significant difference(p = 0.057) was found between foot and leg motor imageries. It suggests that foot-MI might cause larger beta ERD than leg-MI.
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or *** cloud compu...
详细信息
Since its birth in the early 90 's,digital forensics has been mainly focused on collecting and examining digital evidence from computers and networks that are controlled and owned by individuals or *** cloud computing has recently emerged as a dominant platform for running applications and storing data,digital forensics faces well-known challenges in the cloud,such as data inaccessibility,data and service volatility,and law enforcement lacks control over the *** date,very little research has been done to develop efficient theory and practice for digital forensics in the *** this paper,we present a novel framework,Cloud Foren,which systematically addresses the challenges of forensics in cloud *** Foren covers the entire process of digital forensics,from the initial point of complaint to the final point where the evidence is *** key components of Cloud Foren address some challenges,which are unique to the *** proposed forensic process allows cloud forensic examiner,cloud provider,and cloud customer collaborate *** use two case studies to demonstrate the applicability of Cloud *** believe Cloud Foren holds great promise for more precise and automatic digital forensics in a cloud computing environment.
暂无评论